Elena Dubrova
Orcid: 0000-0001-7382-9408
According to our database1,
Elena Dubrova
authored at least 177 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Des. Test, October, 2024
Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
A Single-Trace Fault Injection Attack on Hedged Module Lattice Digital Signature Algorithm (ML-DSA).
Proceedings of the Workshop on Fault Detection and Tolerance in Cryptography, 2024
Proceedings of the 27th Euromicro Conference on Digital System Design, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
J. Cryptogr. Eng., November, 2023
J. Hardw. Syst. Secur., March, 2023
IACR Cryptol. ePrint Arch., 2023
A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs.
Proceedings of the 53rd IEEE International Symposium on Multiple-Valued Logic, 2023
A side-channel resistant implementation of AES combining clock randomization with duplication.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2023
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2023
A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber's Encapsulation Algorithm.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts.
Proceedings of the Codes, Cryptology and Information Security, 2023
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023
Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Side-Channel Attack Countermeasures Based On Clock Randomization Have a Fundamental Flaw.
IACR Cryptol. ePrint Arch., 2022
Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber.
IACR Cryptol. ePrint Arch., 2022
Towards Generic Power/EM Side-Channel Attacks: Memory Leakage on General-Purpose Computers.
Proceedings of the 30th IFIP/IEEE 30th International Conference on Very Large Scale Integration, 2022
A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
SN Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 51st IEEE International Symposium on Multiple-Valued Logic, 2021
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
2020
Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 28th IFIP/IEEE International Conference on Very Large Scale Integration, 2020
Proceedings of the HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, 2020
Proceedings of the 50th IEEE International Symposium on Multiple-Valued Logic, 2020
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
Proceedings of the Smart Card Research and Advanced Applications, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE 49th International Symposium on Multiple-Valued Logic (ISMVL), 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
2018
Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test.
Cryptogr. Commun., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 2018 IEEE Nordic Circuits and Systems Conference, 2018
Comparison of CRC and KECCAK Based Message Authentication for Resource-Constrained Devices.
Proceedings of the 16th IEEE International New Circuits and Systems Conference, 2018
Proceedings of the 16th IEEE International New Circuits and Systems Conference, 2018
Proceedings of the 48th IEEE International Symposium on Multiple-Valued Logic, 2018
An efficient SAT-based algorithm for finding short cycles in cryptographic algorithms.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
2017
Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST.
J. Signal Process. Syst., 2017
Int. J. Circuit Theory Appl., 2017
Cryptogr. Commun., 2017
TVL-TRNG: Sub-Microwatt True Random Number Generator Exploiting Metastability in Ternary Valued Latches.
Proceedings of the 47th IEEE International Symposium on Multiple-Valued Logic, 2017
Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices.
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems, 2017
Temperature aware phase/frequency detector-basec RO-PUFs exploiting bulk-controlled oscillators.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
2016
IACR Cryptol. ePrint Arch., 2016
A SAT-Based Algorithm for Finding Short Cycles in Shift Register Based Stream Ciphers.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016
Proceedings of the 46th IEEE International Symposium on Multiple-Valued Logic, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things.
Enterp. Inf. Syst., 2015
CoRR, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014
Energy-efficient message authentication for IEEE 802.15.4-based wireless sensor networks.
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014
Proceedings of the 2014 International Symposium on System-on-Chip, 2014
An Algorithm for Constructing a Minimal Register with Non-linear Update Generating a Given Sequence.
Proceedings of the IEEE 44th International Symposium on Multiple-Valued Logic, 2014
Proceedings of the 19th IEEE European Test Symposium, 2014
Synthesis of power- and area-efficient binary machines for incompletely specified sequences.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014
2013
A Scalable Method for Constructing Galois NLFSRs With Period 2<sup>n</sup>-1 Using Cross-Join Pairs.
IEEE Trans. Inf. Theory, 2013
J. Multiple Valued Log. Soft Comput., 2013
An Algorithm for Constructing a Smallest Register with Non-Linear Update Generating a Given Binary Sequence.
CoRR, 2013
Proceedings of the Radio Frequency Identification, 2013
Proceedings of the 43rd IEEE International Symposium on Multiple-Valued Logic, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Proceedings of the Great Lakes Symposium on VLSI 2013 (part of ECRC), 2013
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013
Proceedings of the 2013 Euromicro Conference on Digital System Design, 2013
2012
Finding Attractors in Synchronous Multiple-Valued Networks Using SAT-based Bounded Model Checking.
J. Multiple Valued Log. Soft Comput., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 42nd IEEE International Symposium on Multiple-Valued Logic, 2012
Power-security trade-off in multi-level power analysis countermeasures for FSR-based stream ciphers.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the 30th International IEEE Conference on Computer Design, 2012
An Architectural Countermeasure against Power Analysis Attacks for FSR-Based Stream Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012
Proceedings of the Complex Networks, results of the 3rd Workshop on Complex Networks, 2012
2011
IEEE ACM Trans. Comput. Biol. Bioinform., 2011
Proceedings of the IEEE 29th International Conference on Computer Design, 2011
Proceedings of the 2011 IEEE/ACM International Conference on Computer-Aided Design, 2011
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, 2011
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, 2011
2010
Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations.
IEEE Trans. Inf. Theory, 2010
Proceedings of the Sequences and Their Applications - SETA 2010, 2010
Pulse latch based FSRs for low-overhead hardware implementation of cryptographic algorithms.
Proceedings of the 28th International Conference on Computer Design, 2010
Proceedings of the 13th Euromicro Conference on Digital System Design, 2010
2009
IEEE Trans. Inf. Theory, 2009
Proceedings of the Design, Automation and Test in Europe, 2009
2008
Trans. Comp. Sys. Biology, 2008
CoRR, 2008
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008
Proceedings of the Design, Automation and Test in Europe, 2008
Proceedings of the 3rd International ICST Conference on Bio-Inspired Models of Network, 2008
2007
Proceedings of the 37th International Symposium on Multiple-Valued Logic, 2007
Proceedings of the 2nd International ICST Conference on Bio-Inspired Models of Network, 2007
2006
Proceedings of the 36th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2006), 2006
2005
IEEE Trans. Computers, 2005
Linear-time algorithm for computing minimum checkpoint sets for simulation-based verification of HDL programs.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the 2005 International Conference on Computer-Aided Design, 2005
Computing attractors in dynamic networks.
Proceedings of the AC 2005, 2005
Proceedings of the 2005 Design, 2005
Proceedings of the 2005 Design, 2005
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005
2004
J. Multiple Valued Log. Soft Comput., 2004
A Polynomial Time Algorithm for Non-Disjoint Decomposition of Multiple-Valued Functions.
Proceedings of the 34th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2004), 2004
On relation between non-disjoint decomposition and multiple-vertex dominators.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Hermes: LUT FPGA technology mapping algorithm for area minimization with optimum depth.
Proceedings of the 2004 International Conference on Computer-Aided Design, 2004
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004
2003
Fast Algorithm for Computing Spectral Transforms of Boolean and Multiple-Valued Functions on Circuit Representation.
Proceedings of the 33rd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2003), 2003
Proceedings of the 33rd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2003), 2003
Proceedings of the 21st International Conference on Computer Design (ICCD 2003), 2003
Proceedings of the 2003 Asia and South Pacific Design Automation Conference, 2003
2002
Circuit-Based Evaluation of the Arithmetic Transform of Boolean Functions.
Proceedings of the 11th IEEE/ACM International Workshop on Logic & Synthesis, 2002
Technology Mapping for Chemically Assembled Electronic Nanotechnology.
Proceedings of the 11th IEEE/ACM International Workshop on Logic & Synthesis, 2002
A Fast Heuristic Algorithm for Disjunctive.
Proceedings of the 11th IEEE/ACM International Workshop on Logic & Synthesis, 2002
Proceedings of the 32nd IEEE International Symposium on Multiple-Valued Logic (ISMVL 2002), 2002
Proceedings of the 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2002), 2002
Proceedings of the 2002 Design, 2002
2001
Proceedings of the 2001 International Conference on Microelectronics Systems Education, 2001
Power Efficient Inter-Module Communication for Digit-Serial DSP Architectures in Deep-Submicron Technology.
Proceedings of the 31st IEEE International Symposium on Multiple-Valued Logic, 2001
2000
IEEE Trans. Computers, 2000
IEEE Trans. Computers, 2000
Proceedings of the 2000 Design, 2000
1999
Mod-p Decision Diagrams: A Data Structure for Multiple-Valued Functions.
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1999
Probabilistic Verification of Multiple-Valued Functions
Universität Trier, Mathematik/Informatik, Forschungsbericht, 1999
Proceedings of the 29th IEEE International Symposium on Multiple-Valued Logic, 1999
1997
PhD thesis, 1997
Proceedings of the 27th IEEE International Symposium on Multiple-Valued Logic, 1997
1996
Proceedings of the 26th IEEE International Symposium on Multiple-Valued Logic, 1996
1995
Proceedings of the 25th IEEE International Symposium on Multiple-Valued Logic, 1995
1994
Proceedings of the 24th IEEE International Symposium on Multiple-Valued Logic, 1994